• Title/Summary/Keyword: Between reader

Search Result 366, Processing Time 0.023 seconds

Hash based Secure RFID Authentication Protocol for User Privacy Protection (사용자 프라이버시 보호를 위한 해쉬 기반의 안전한 RFID 인증 프로토콜)

  • Lee, Han-Kwon;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • RFID, a non-contact wireless identification technology is being noticed as a technology to alternate barcode system in distribution industry and general industry. Despite of merit of RFID, there are issues to be solved for practical use. One of them, which are most important, is resolution of user's information protection. RFID system without security function bears risk exposing personal data and user's privacy. In this paper, we propose mutual authentication protocol for RFID system in order to solve this security issue. This study aimed to protect user's privacy by providing dynamic ID for tag through authentication protocol safe from security threats. Information being transmitted between backend, reader and tag has no direct connection with ID of tag, and it conducts authentication process using one-way hash function, which prevents attacker's obtaining of tag information using information being transmitted.

  • PDF

A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments (유비쿼터스 환경에서의 안전하고 효율적인 이종 RFID 관리 기법)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.275-285
    • /
    • 2009
  • RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.

Implementation Access Control System Based on CAN Communication (CAN통신 기반 출입통제 시스템 구현)

  • Song, Chong-kwan;Park, Jang-sik;Kim, Hyun-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.467-470
    • /
    • 2009
  • CAN communication developed for communication between electric control devices in vehicle, was recently applied to automatic braking devices, and can also be applied to field bus for production automation. Recently, field bus is introduced in engine control, etc. for large ship. In this paper, cabin access control system can be implemented, based on CAN communication. The cabin access control system based on CAN communication consists of access control server, embedded system based on ARM9, and micro-controller built-in CAN controller. The access control server can be able to manage overall access control system by accessing with manager. And embedded system adopted ARM9 processor transmits access information of RFID reader controller connected with CAN networks to server, also performs access control. The embedded system can carry CAN frames to server, so it can be used as gateway.

  • PDF

Image of Eternity in N. Gogol's «Rome» (N. 고골의 단편(단편(斷篇)) 『로마』에 나타난 영원성의 이미지)

  • Kim, Sung IL
    • Cross-Cultural Studies
    • /
    • v.37
    • /
    • pp.51-79
    • /
    • 2014
  • Seriously depressed by the failure in the first performance of his own drama ${\ll}$The Government Inspector${\gg}$, N. Gogol sought out a space, Italy, which is obviously a turning point for the writer. Here in Italy, the writer could be able to explore an essential foundation for the national identity as well as self-identification of Russian traditional culture, all of which have already been epitomized in the Renaissance period in Italy. The city Rome itself provided Gogol with its grandness and harmonious perfectness, influencing something 'spiritual being' upon the writer. The work under discussion, "Rome," is thus created through these literary circumstances. Though it is made under the different title as "Annuntiata" and it delivers a love story between lovers, the story lines gradually turned into a fiction about the city, Rome. In comparison with city Paris, Gogol himself presents a negative view of the French metropolitan, saying that it is nothing but a by-product of the 19th century civilization. Interestingly enough, Rome for Gogol is totally different; it is the place of sublimity, that is a locus of harmonious, holy, and eternal city. Likewise, this pattern can be said of another description on the two contradictory cities: Paris and Rome. Again, Gogol fully pictures the city Paris as centripetal and Rome as centrifugal, in which the main protagonist makes the reader indulge in his own world. Throughout the story the writer tells us a transformation experienced by his character, and the work ends with an open denouement. Like Jerusalem, Rome is the city of resurrection for Gogol. Yet, this kind of possibility of transformation in the story is exposed to the hero, and it arguably depends on the extent to which he explores the readiness for encountering of 'eternity' in this "eternal city."

Diagnosis of Rotator Cuff Tears with Non-Arthrographic MR Imaging: 3D Fat-Suppressed Isotropic Intermediate-Weighted Turbo Spin-Echo Sequence versus Conventional 2D Sequences at 3T

  • Hong, Won Sun;Jee, Won-Hee;Lee, So-Yeon;Chun, Chang-Woo;Jung, Joon-Yong;Kim, Yang-Soo
    • Investigative Magnetic Resonance Imaging
    • /
    • v.22 no.4
    • /
    • pp.229-239
    • /
    • 2018
  • Purpose: To assess the diagnostic performance in detecting rotator cuff tears at 3T of non-arthrographic shoulder magnetic resonance imaging (MRI) using 3D isotropic turbo spin-echo (TSE-SPACE) sequence as compared with 2D sequences. Materials and Methods: Seventy-four patients who were arthroscopically confirmed to have underwent non-arthrographic shoulder MRI with 2D sequences and TSE-SPACE were included. Three independent readers retrospectively scored supraspinatus and infraspinatus tendon (SST-IST) and subscapularis tendon (SCT) tears on 2D sequences and TSE-SPACE. Results: The mean sensitivity, specificity, and accuracy of the three readers were 95%, 100%, and 95% on TSE-SPACE and 99%, 93%, and 98% on 2D sequences for detecting SST-IST tears, respectively, whereas those were 87%, 49%, and 68% on TSESPACE and 88%, 66%, and 77% on 2D sequences for detecting SCT tears, respectively. There was no statistical difference between the two sequences, except for in the specificity of one reader for detecting SCT tears. The mean AUCs of the three readers on TSE-SPACE and 2D sequences were 0.96 and 0.98 for detecting SST-IST tears, respectively, which were not significantly different, while those were 0.71 and 0.82 for detecting SCT tears, respectively, which were significantly different (P < 0.05). Conclusion: TSE-SPACE may have accuracy and reliability comparable to conventional 2D sequences for SST-IST tears at non-arthrographic 3T shoulder MRI, whereas TSE-SPACE was less reliable than conventional 2D sequences for detecting SCT tears.

An Examination into the 61 Senders of Letters Contained in 『Haerincheokso(海隣尺素)』 (『해린척소(海隣尺素)』 발신자(發信者) 61인(人) 인물(人物) 탐색(探索))

  • Chaung, Hoosoo
    • (The)Study of the Eastern Classic
    • /
    • no.35
    • /
    • pp.447-470
    • /
    • 2009
  • "Haerincheokso" is a collection of 279 letters, including the last one Gong Heon-gyeong sent to Lee Sang-jeok in 1865, which were sent by 61 people from 1830. This study examined the career and activities of each of the 61 senders based on their personal details. First, it was found that the senders had special relationships with Lee Sang-jeok. One of them, for example, published "Eunsongdangjip", a collection of poems written by Lee Sang-jeok. Second, many of the senders were from Jiansu Province, Shanxi Province and Zhejiang Province. Third, more than 50 percent of people Lee Sang-jeok had a friendship with were outstanding intellectuals who were Jinsa or Geoin. Fourth, all of the senders except for a monk and the owner of a ginseng shop did vigorous cultural activities in Yanjing at the time. If the reader read "Haerincheokso" based on information above, he will be able to reduce mistakes of misreading the book. Furthermore, the book offers some materials necessary to grasp the cultural exchanges between Korea and China in the 19th century.

RFID Mutual Authentication Protocol Providing Improved Privacy and Resynchronization (개선된 프라이버시와 재동기화를 제공하는 RFID 상호인증 프로토콜)

  • Kim, Young-Jae;Jeon, Dong-Ho;Kwon, Hye-Jin;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.57-72
    • /
    • 2010
  • Hash based RFID protocols proposed by Ha and M.Burmester is a scheme that tag's ID is updated using hash function to provide forward secrecy after session end. But this protocols have a problem both privacy and efficiency. This paper analyze a problem for privacy to apply a privacy game model proposed by Vaudenay. we analyze the cause that these scheme is difficult with tag's cheap implementation and efficient resynchronization. To solve these problems, we proposed a new hash based mutual authentication protocol which apply only two protocol's advantages. this protocols is based of resynchronization algorithm for Ha et al.'s protocol and added a new simple counter to record the numner of continuous desynchronization between tag and reader secret informations. this counter is more simple than cyclic counter proposed by M. Burmester's protocol. Also, we prove that proposal protocol improve a privacy against a privacy attack which is executed for Ha and M. Burmester's protocols.

A Study on the Methods of Communication Education based on 'Empathy'; for Example <(500) Days of Summer> ('공감'을 기반으로 한 의사소통교육 방법 모색 ; 영화 <500일의 섬머>를 예로)

  • Kim, Kyung Ae
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.279-285
    • /
    • 2021
  • This paper criticized that online classes during the Covid-19 period were centered on knowledge and information education, and sought ways to improve empathy as a way to improve students' sociality. The teaching-learning process was designed around the movie <(500) Days of Summer> which has the theme and story of parting and growth. On this paper the stage of empathy was divided into three stages, recognize-into, feeling-into, emotional-transaction stage. In particular, considering the process of transitioning from emotional empathy to behavioral empathy as the key to communication education, the class was designed in five stages, with an expression stage between the feeling-into stage and the emotional-transaction stage. This course is possible when learners sympathize with the work itself and reflect on their own narrative, so literary therapeutic was used, and students's response statements were collected to prove that this process is meaningful for improving empathy. In this article, the class was designed for the movie <(500) Days of Summer>, but this teaching-learning model can be applied to other contemporary film texts.

Preservice Teachers' Responses to Postmodern Picture Books and Deconstructive Reading

  • Yun, Eunja
    • Journal of English Language & Literature
    • /
    • v.57 no.6
    • /
    • pp.1111-1130
    • /
    • 2011
  • Reading postmodern texts certainly situates readers in roles different from the ones we have been used to. Recently, postmodern metafiction forms a significant body of children's literature that is intended to challenge and transform the conventions of books in the digital age. While many studies have been done as to how child readers have capabilities to appreciate and interpret postmodern metafiction picture books, few studies on teachers and preservice teachers' reactions are not readily available. The role of teachers and preservice teachers are crucial for child readers to have access to affluent reading resources. This study discusses how preservice teachers read and respond to postmodern metafiction picture books using a deconstructive approach by means of binary opposites. Data was collected with 14 preservice teachers as to their likes/dislikes, reading levels, and reading paths about postmodern metafiction picture books. Expected pedagogical implications for literacy and language education were requested to address in their reading diaries and response papers. With their likes/ dislikes, since binary opposites always imply the hierarchy of power and value, the likes is apparently more valued and appreciated over their dislikes. This differentiated values are discussed in more detail with three recurring themes-Education, Morals and Behavior, and Tradition. With reading levels, there seems to be a gap existing between the authors' implied reader and literary critics' and the preservice teachers' ideal readers for the postmodern metafiction picture books. Although many studies have already revealed young readers' capability of appreciating postmodern metafiction, it depends a lot more on the teachers and preservice teachers whether children's right to have access to affluent literacy resources is respected or not. Preservice teachers' awareness of the potential of postmodern metafiction will work as an initial step to bring and realize the new reading path and new literacies in classrooms. By challenging metanarratives of children's literature, preservice teachers' readings of postmodern picture books reveals potentials to raise different reading paths and develop new literacies and other educational implications.

Imaging Patterns of Bacillus Calmette-Guérin-Related Granulomatous Prostatitis Based on Multiparametric MRI

  • Seungsoo Lee;Young Taik Oh;Hye Min Kim;Dae Chul Jung;Hyesuk Hong
    • Korean Journal of Radiology
    • /
    • v.23 no.1
    • /
    • pp.60-67
    • /
    • 2022
  • Objective: To categorize multiparametric MRI features of Bacillus Calmette-Guérin (BCG)-related granulomatous prostatitis (GP) and discover potential manifestations for its differential diagnosis from prostate cancer. Materials and Methods: The cases of BCG-related GP in 24 male (mean age ± standard deviation, 66.0 ± 9.4 years; range, 50-88 years) pathologically confirmed between January 2011 and April 2019 were retrospectively reviewed. All patients underwent intravesical BCG therapy followed by a MRI scan. Additional follow-up MRI scans, including diffusion-weighted imaging (DWI), were performed in 19 patients. The BCG-related GP cases were categorized into three: A, B, or C. The lesions with diffusion restriction and homogeneous enhancement were classified as type A. The lesions with diffusion restriction and a poorly enhancing component were classified as type B. A low signal intensity on high b-value DWI (b = 1000 s/mm2) was considered characteristic of type C. Two radiologists independently interpreted the MRI scans before making a consensus about the types. Results: The median lesion size was 22 mm with the interquartile range (IQR) of 18-26 mm as measured using the initial MRI scans. The lesion types were A, B, and C in 7, 15, and 2 patients, respectively. Cohen's kappa value for the inter-reader agreement for the interpretation of the lesion types was 0.837. On the last follow-up MRI scans of 19 patients, the size decreased (median, 5.8 mm; IQR, 3.4-8.5 mm), and the type changed from A or B to C in 11 patients. The lesions resolved in four patients. In five patients who underwent prostatectomy, caseous necrosis on histopathology matched with the non-enhancing components of type B lesions and the entire type C lesions. Conclusion: BCG-related GP demonstrated three imaging patterns on multiparametric MRI. Contrast-enhanced T1-weighted imaging and DWI may play a role in its differential diagnosis from prostate cancer.